The unique menace actor behind the Octo malware household has launched a brand new variant, Octo2, with enhanced stability for distant motion capabilities to facilitate System Takeover assaults.
This new variant targets European nations and employs subtle obfuscation strategies, together with the Area Technology Algorithm (DGA), to evade detection and make sure the Trojan stays undetected.
The Exobot malware household, initially a banking trojan, developed into ExobotCompact in 2019. In 2021, a brand new variant, dubbed “Coper,” was found, which was recognized as ExobotCompact, and in 2022, ExobotCompact was rebranded as “Octo.”


Since then, Octo has gained recognition amongst menace actors as a result of its leaked supply code and new model, Octo2, which provides enhanced distant entry capabilities.
This has led to elevated exercise and campaigns involving Octo within the cellular menace panorama.
The evaluation of Octo2 malware reveals its world concentrating on potential because the malware-as-a-service platform has been noticed in numerous areas, together with Europe, the USA, Canada, the Center East, Singapore, and Australia.
Octo2’s settings deal with intercepting push notifications from particular functions, suggesting potential assault targets.
Preliminary campaigns had been seen in Italy, Poland, Moldova, and Hungary, however broader world concentrating on is anticipated, whereas Zombinder is used to bypass Android 13+ restrictions and set up Octo2.
Free Webinar on Find out how to Defend Small Companies In opposition to Superior Cyberthreats -> Free Registration


It has been up to date with a number of enhancements to reinforce its distant management stability throughout System Takeover assaults and to evade detection and evaluation, which embrace enhanced anti-detection and anti-analysis strategies, making it tougher for safety options to establish and block the malware.
Moreover, Octo2 has been optimized to enhance the soundness of distant management classes, guaranteeing that attackers can extra reliably preserve management over compromised units.
It has additionally been up to date with enhanced RAT capabilities, together with a brand new setting to cut back information transmission and enhance connection stability on poor networks.
The malware’s anti-analysis and anti-detection strategies have additionally been strengthened by implementing a extra advanced obfuscation course of involving native code decryption and dynamic library loading.
This makes Octo2 extra resilient to detection and evaluation, posing a larger menace to safety.
It employs a Area Technology Algorithm (DGA) to dynamically generate C2 server names, making it tough to trace and block.
It additionally makes use of a cryptographic salt to generate a singular encryption key for every C2 request to reinforce safety and make information interception more difficult.
In response to Menace Material, this mixture of strategies poses a major menace to cellular banking safety because it makes Octo2 extra resilient to detection and elimination.
The Octo2 cellular malware variant poses a major menace to banking safety as a result of its superior options, together with distant entry, obfuscation, and simple customization.
Its predecessor’s leaked supply code has contributed to its widespread availability and adaptableness.
By invisibly performing on-device fraud and intercepting delicate information, Octo2 can goal cellular banking customers globally.
To mitigate this threat, customers and monetary establishments should prioritize sturdy safety measures and keep vigilant towards evolving threats.
Analyse AnySuspicious Hyperlinks Utilizing ANY.RUN's New Protected Searching Device: Attempt It for Free